Documen 2 T

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Vulnerability Scan

October 3, 2023

Report
prepared by
HostedScan Security

hostedscan.com
HostedScan Security Vulnerability Scan Report

Overview
1 Executive Summary 3
2 Risks By Target 4
3 Open TCP Ports 6
4 Glossary 18

hostedscan.com 2
Executive Summary Vulnerability Scan Report

1 Executive Summary
Vulnerability scans were conducted on selected servers, networks, websites, and applications. This report
contains the discovered potential risks from these scans. Risks have been classified into categories according
to the level of threat and degree of potential harm they may pose.

1.1 Total Risks


Below is the total number of risks found by severity. High risks are the most severe and should be evaluated
first. An accepted risk is one which has been manually reviewed and classified as acceptable to not fix at this
time, such as a false positive or an intentional part of the system's architecture.

0
Critical
0High
9
Medium
2
Low
0
Accepted

82% 18%

1.2 Report Coverage


This report includes findings for 1 target that were scanned. Each target is a single URL, IP address, or fully
qualified domain name (FQDN).

Vulnerability Categories

11
Open TCP Ports

hostedscan.com 3
Risks By Target Vulnerability Scan Report

2 Risks By Target
This section contains the vulnerability findings for each target that was scanned. Prioritize the most
vulnerable assets first.

2.1 Targets Summary


The total number of risks found for each target, by severity.

Target Critical High Medium Low Accepted


gintic.com.co 0 0 9 2 0

hostedscan.com 4
Risks By Target | gintic.com.co Vulnerability Scan Report

2.2 Target Breakdowns


The risks discovered for each target.

Target
gintic.com.co
Total Risks
0 0 9 2 0
82% 18%

Open TCP Ports Threat Level First Detected


Open TCP Port: 21 Medium 0 days ago
Open TCP Port: 110 Medium 0 days ago
Open TCP Port: 143 Medium 0 days ago
Open TCP Port: 995 Medium 0 days ago
Open TCP Port: 993 Medium 0 days ago
Open TCP Port: 3306 Medium 0 days ago
Open TCP Port: 2525 Medium 0 days ago
Open TCP Port: 5432 Medium 0 days ago
Open TCP Port: 18765 Medium 0 days ago
Open TCP Port: 443 Low 0 days ago
Open TCP Port: 80 Low 0 days ago

hostedscan.com 5
Open TCP Ports Vulnerability Scan Report

3 Open TCP Ports


The NMAP TCP port scan discovers open TCP ports with a complete scan of ports 0 to 65535.

3.1 Total Risks


Total number of risks found by severity.

0
Critical
0High
9
Medium
2
Low
0
Accepted

82% 18%

3.2 Risks Breakdown


Summary list of all detected risks.

Title Threat Level Open Accepted


Open TCP Port: 21 Medium 1 0
Open TCP Port: 110 Medium 1 0
Open TCP Port: 143 Medium 1 0
Open TCP Port: 995 Medium 1 0
Open TCP Port: 993 Medium 1 0
Open TCP Port: 3306 Medium 1 0
Open TCP Port: 2525 Medium 1 0
Open TCP Port: 5432 Medium 1 0
Open TCP Port: 18765 Medium 1 0
Open TCP Port: 443 Low 1 0
Open TCP Port: 80 Low 1 0

hostedscan.com 6
Open TCP Ports | Open TCP Port: 21 Vulnerability Scan Report

3.3 Full Risk Details


Detailed information about each risk found by the scan.

Open TCP Port: 21


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 7
Open TCP Ports | Open TCP Port: 110 Vulnerability Scan Report

Open TCP Port: 110


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 8
Open TCP Ports | Open TCP Port: 143 Vulnerability Scan Report

Open TCP Port: 143


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 9
Open TCP Ports | Open TCP Port: 995 Vulnerability Scan Report

Open TCP Port: 995


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 10
Open TCP Ports | Open TCP Port: 993 Vulnerability Scan Report

Open TCP Port: 993


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 11
Open TCP Ports | Open TCP Port: 3306 Vulnerability Scan Report

Open TCP Port: 3306


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 12
Open TCP Ports | Open TCP Port: 2525 Vulnerability Scan Report

Open TCP Port: 2525


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 13
Open TCP Ports | Open TCP Port: 5432 Vulnerability Scan Report

Open TCP Port: 5432


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 14
Open TCP Ports | Open TCP Port: 18765 Vulnerability Scan Report

Open TCP Port: 18765


Medium

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 15
Open TCP Ports | Open TCP Port: 443 Vulnerability Scan Report

Open TCP Port: 443


Low

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 16
Open TCP Ports | Open TCP Port: 80 Vulnerability Scan Report

Open TCP Port: 80


Low

Description
An open port may be an expected configuration. For example, web servers use port 80 to serve websites over http and port 443
to serve websites over https. For a list of commonly used ports see
https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers.
An unexpected open port could give unintended access to applications, data, and private networks. Open ports can also be
dangerous when expected services are out of date and exploited through security vulnerabilities.

Vulnerable Target First Detected


gintic.com.co 0 days ago

hostedscan.com 17
Glossary Vulnerability Scan Report

4 Glossary
Accepted Risk Open TCP Ports
An accepted risk is one which has been manually The NMAP TCP port scan discovers open TCP ports with a
reviewed and classified as acceptable to not fix at this complete scan of ports 0 to 65535.
time, such as a false positive or an intentional part of the
system's architecture. Risk
Fully Qualified Domain Name (FQDN) A risk is a finding from a vulnerability scan. Each risk is a
potential security issue that needs review. Risks are
A fully qualified domain name is a complete domain name assigned a threat level which represents the potential
for a specific website or service on the internet. This severity.
includes not only the website or service name, but also the
top-level domain name, such as .com, .org, .net, etc. For Target
example, 'www.example.com' is an FQDN. A target represents target is a single URL, IP address, or
fully qualified domain name (FQDN) that was scanned.
Threat Level
The threat level represents the estimated potential
severity of a particular risk. Threat level is divided into 4
categories: High, Medium, Low and Accepted.
Threat Level
The threat level represents the estimated potential
severity of a particular risk. Threat level is divided into 5
categories: Critical, High, Medium, Low and Accepted.
CVSS Score
The CVSS 3.0 score is a global standard for evaluating
vulnerabilities with a 0 to 10 scale. CVSS maps to threat
levels: 0.1 - 3.9 = Low, 4.0 - 6.9 = Medium, 7.0 - 8.9 =
High, 9.0 - 10.0 = Critical

hostedscan.com 18
This report was prepared using
HostedScan Security ®
For more information, visit hostedscan.com
Founded in Seattle, Washington in 2019, HostedScan, LLC. is
dedicated to making continuous vulnerability scanning and risk
management much more easily accessible to more businesses.

HostedScan, LLC.
2212 Queen Anne Ave N
Suite #521 Terms & Policies
Seattle, WA 98109 hello@hostedscan.com

hostedscan.com 19

You might also like